Charter School Case Analysis

Improved Essays
“You Decide” Charter School Scenario
Situation Analysis
This proposal is for an evaluation of the current network at Leonard Cooper Charter School, as well as a list of recommendations to address concerns raised by system technicians and end-users. Leonard Cooper Charter has roughly 1,000 students and faculty, all needing a smooth connection to the school LAN. A new addition was added to the building a few years ago, and has resulted in numerous IT problems for the school. Overall, stakeholders have indicated general dissatisfaction regarding network speed and reliability. Key areas of concern or desired revision that were noted include a large number of printers without an efficient or reliable networking management system; severe bottlenecking
…show more content…
The recommended solution is an upgrade to Category 6 UTP 1000Base –T Ethernet cabling. The built-in Carrier Sense Multiple Access with Collision Detection will assist with the collisions currently resulting in the bottlenecks by assigning a random time interval before attempting to resubmit on the network. Currently, the network bandwidth has a small capacity, at only 10Mb. By upgrading to Fiber 1000Based-F Ethernet cabling, the capacity can be increased to 100Gb/sec. This will resolve the bottlenecking that occurs during the high-traffic morning hours when teachers are submitting attendance and checking their e-mails. A slow connection to the e-mail server was also reported, which would be remedied by the higher bandwidth connection provided by the Ethernet cabling. There is then the issue of the twenty-three additional computers in the new wing that are currently not connecting to the network. The old and new wings are connected via twisted-pair wiring, which will not support the additional demand on the network. The new backbone network should be converted to a fiber optic. This will not only clear the current congestion, but will also allow for the additional computers on the network without creating bottleneck

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    The best thing is that if anything needs reconnecting for a different use, all source connections are available in a single space without needing to change any cables. The fiber optic cable would be appropriate because as the business relies on the internet for more and more of their ongoing operations, they are essentially sending and receiving more packets of data. There will be running, on average,…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 2 Case Study

    • 177 Words
    • 1 Pages

    The next challenge would be to determine if the budget allows an upgrade from WEP to WPA2 in order to protect the company’s data. WPA2 being the best and may not be available on current equipment. Most small business do…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    For a low, one-time cost of $999, Baylor can install 20 NetGear WiFi routers around key campus locations where internet activity hits its peak such as libraries, dorms, and academic buildings. Since the routers all take an ethernet line to connect to the internet, replacing the older outdated ones is as simple as switching them out. Afterwards, Baylor students will be able to instantly connect to the internet at faster speeds. With industry-standard security and universally compatible internet routers, students will be able to print documents, access the internet, study and complete their assignments with ease - no more outages! A faster AirBear network allows students to thrive in their academics all across…

    • 744 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    In today’s society, an internet connection is a precious commodity that enables the population to communicate with one another, access information, and work. Without an internet connection, people and business cannot compete in today’s world. Likewise, it is important for Texas to develop a better telecommunication infrastructure. Historically, Texas has done a decent job supporting the development of the telecommunications infrastructure. For example, “In 1995, the Legislature created the Telecommunications Infrastructure Fund Board who raised $1.75 billion; and funded more than 11,000 grants to assist educational institutions and healthcare centers establish telecommunication projects …”…

    • 907 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Technology Framework Design In this section, we combine the user domain needs described in Part 1 of this proposal, the physical framework requirements described in Part 2, and the technology selections described in Part 3 to create the final Digital Edge Manufacturing network infrastructure proposal. Choosing the Cabling Used in the Network We considered infrastructure costs, speed, and reliability for cabling and adaptors. Our network employed hybrid type of network sine we use Ethernet cable, Wi-Fi and fiber optic as our media.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Razer Blade Topic This is my personal essay of why I believe should receive a Razer Blade Pro for either my birthday or entering my Freshman year in high school. These reasons are the two laptops available to me now are barely functioning pieces of technology, this is the best laptop available for work and gaming, and it has the best technology for that price, or for really any price. Firstly, I love the idea of school being computerized. The only problem is that the computers that the school is using are terrible.…

    • 287 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Freeman-Brown Private School Case In the following essay, it will be discussing the Freeman-Brown private school case study. It will discuss the complex adaptive systems, organizational culture and climates, the reasoning to and why the closure happened, the social responsibilities and impact on stakeholders, administration closure options, and the plans for future direction of FBPS. Systems…

    • 764 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Metro High School System

    • 998 Words
    • 4 Pages

    In support of the Metro High school's mission of teaching, research, and public service, the Metro High school system provides computers, a network, and resources for the facility, students, faculty, and staff. Rights and Responsibilities While the school does provide some computers there may not be enough for all students/employees and therefore students/employees are encouraged to bring their own computers or tablets. The networks can provide access to resources both inside and outside within the area of school grounds. The network will have the ability to communicate with other users outside of the schools network. Such access is a privilege, and requires that users act accordingly.…

    • 998 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The best way to evaluate a denial of service (DoS) incident is to base it on the incident analysis that was previously done. From the analysis we had gathered valuable information and this is my evaluation. After getting complaints that the network was running slow I immediately started to do an incident analysis to find out what was happening (Tipton & Frause 2007). So, I decided to use the National Institute of Standards and Technology methodology to seek the answers.…

    • 337 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Digital Technologies Case

    • 1035 Words
    • 5 Pages

    Matthew has made terrific progress in Digital Technologies. The main areas that held him back from getting an Excellence for the Website assessment was his planning and testing. He did improve his planning during the Database project but again his testing was insufficient. He is currently writing a report due before the end of the term on Networking. Bayley is making adequate progress in Digital Technologies.…

    • 1035 Words
    • 5 Pages
    Decent Essays
  • Superior Essays

    Q1.Explain how the optical disk storage facility operates? Optical disk storage is an advancement of the floppy disk. The optical disk storage also called optical media is shinny and both recording surfaces are protected by two plastic plates which make it less exposed to dust and contamination. Unlike the floppy disks that store up to 1.44 of data, optical disks storages can store up to 650MB of data. They are 5.25 inches (12cm) and have a high storage density.…

    • 1249 Words
    • 5 Pages
    Superior Essays